Resubmissions
31/08/2024, 14:13
240831-rjsawsxgjc 831/08/2024, 14:13
240831-rjhrfsxfrd 331/08/2024, 14:12
240831-rh483axeqk 331/08/2024, 14:05
240831-rdw2wsxcqr 10Analysis
-
max time kernel
1680s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/08/2024, 14:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://getwave.fr/
Resource
win11-20240802-en
General
-
Target
https://getwave.fr/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 3304 msedge.exe 3304 msedge.exe 1952 msedge.exe 1952 msedge.exe 1220 identity_helper.exe 1220 identity_helper.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3304 wrote to memory of 1552 3304 msedge.exe 79 PID 3304 wrote to memory of 1552 3304 msedge.exe 79 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 1672 3304 msedge.exe 80 PID 3304 wrote to memory of 3952 3304 msedge.exe 81 PID 3304 wrote to memory of 3952 3304 msedge.exe 81 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82 PID 3304 wrote to memory of 5092 3304 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://getwave.fr/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffee69a3cb8,0x7ffee69a3cc8,0x7ffee69a3cd82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,194705155054955546,6733965402273044570,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54c3889d3f0d2246f800c495aec7c3f7c
SHA1dd38e6bf74617bfcf9d6cceff2f746a094114220
SHA2560a4781bca132edf11500537cbf95ff840c2b6fd33cd94809ca9929f00044bea4
SHA5122d6cb23e2977c0890f69751a96daeb71e0f12089625f32b34b032615435408f21047b90c19de09f83ef99957681440fdc0c985e079bb196371881b5fdca68a37
-
Filesize
152B
MD5c4a10f6df4922438ca68ada540730100
SHA14c7bfbe3e2358a28bf5b024c4be485fa6773629e
SHA256f286c908fea67163f02532503b5555a939f894c6f2e683d80679b7e5726a7c02
SHA512b4d407341989e0bbbe0cdd64f7757bea17f0141a89104301dd7ffe45e7511d3ea27c53306381a29c24df68bdb9677eb8c07d4d88874d86aba41bb6f0ce7a942c
-
Filesize
546B
MD582a7592b880a10ef134029a532bea89e
SHA1f8de5d68fec53565e839e34ddc69da1bd8320aaf
SHA256eb9bf7afcc9862d47a4725b0cd34db175bcccd17966da002c1073aff65b33b87
SHA512595873151f6a859c51939ecd75df86f75e9e0caa4f634ffe9125ab4055b430305580c76f14529d829ac969e5017c0e0b6e6f7e3989054d82d37cb73353613a29
-
Filesize
5KB
MD5d3e7a249eb2f5396829a99533f38395a
SHA13d15bbfcc528d405dadeb023b7116927873b04bb
SHA256dd902b6a3537a79567ac34317c327a98ec08253288cd4ae09a1d2584854ef7c5
SHA512ce983397eb36b83e281915da1d64f867e2745cfc5cb250775461aa06ef20b863598734172bc7b58fea0ca333c1a3cce8da71e0b554ed8ad177badffe335631cf
-
Filesize
6KB
MD522e62a13827d615bf2f7dd6f731daf0d
SHA150018b269d493650bff56c7f685fb6ad8b2ddb18
SHA25667aeb9315e007261b36311b2d46fe30ad7826bd5e24fa667fbaa74df03ae4d0a
SHA512f8dbf78d9b9874337db9e40acc3658aef675dbfa04d8ece27336b92cb42af49c35231940f0ce7e50f98fe68cfc1c5b15dc75614dbfc67fe4e3f32da6d1b8ffa3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57eb85300006ef5d24b18d9b57ca06052
SHA1534c3736c3403aa53bed9953b7cd2fd2b4b3c797
SHA2565eeb5cde316fef3fb0b2d72cbd2ca0b6d54e11b6d4474768b64f4ecabfd93fb7
SHA512cf118e065842a6c7bb977ff1dc4c6cf9e8b6f3a0e60c39a087ff7bcb322712ca2a51d33223e9fbc3a977ff2409262cdb3506c72ae608c6ac976c3979aa505f34